OESA-2026-1108

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1108
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1108.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1108
Upstream
Published
2026-01-16T11:59:24Z
Modified
2026-01-16T12:30:18.610058Z
Summary
mod_security_crs security update
Details

The base rules are provided for mod_security by this package.

Security Fix(es):

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like MULTIPART_PART_HEADERS), the capture variables (TX:0, TX:1) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.(CVE-2026-21876)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / mod_security_crs

Package

Name
mod_security_crs
Purl
pkg:rpm/openEuler/mod_security_crs&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.5-3.oe2403sp1

Ecosystem specific

{
    "src": [
        "mod_security_crs-3.3.5-3.oe2403sp1.src.rpm"
    ],
    "noarch": [
        "mod_security_crs-3.3.5-3.oe2403sp1.noarch.rpm"
    ]
}

Database specific

source

"https://repo.openeuler.org/security/data/osv/OESA-2026-1108.json"